Skip to content
Online Freight Broker


Cybersecurity Courses Powered by EmergingEd: Network Traffic Analysis

This FireEye Mandiant course provides hands-on, tactical experience with network protocols, network architecture, intrusion detection systems, network traffic capture and traffic analysis. Through Live Lab Sessions you’ll study the types of network monitoring and tools used to identify malicious network activity and prevent sophisticated attackers from blending seamlessly with legitimate traffic. Explore the most useful techniques for investigating botnets and how to utilize honeypots in network monitoring.
Course dates: Ongoing enrollment
Course duration: Self-paced
Fee: $4,050
Register now.

Instructor: Jessica Hays
Jessica Hays is a technical instructor at FireEye Mandiant. With 13 years of experience in the cybersecurity field, she has worked in a variety of capacities, including incident response and handling, but is currently specializing in cybersecurity awareness through proactive measures and threat intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government intelligence agencies.

Cybersecurity Courses Powered by EmergingEd: Cybersecurity Awareness

Thrown in the deep end of cybersecurity without sufficient training? This Mandiant course introduces students to foundational elements of cybersecurity programs, including security governance to establish a security framework and ways to align the security program with business objectives. You'll learn to identify common attacker methodologies, and how an attacker enters, persists, and exfiltrates data from an organization via the attack lifecycle. Establish governance that will provide guidance and oversight to your cybersecurity program and assess its risks.

Course dates: Ongoing enrollment
Course duration: Self-paced
Fee: $3,000
Register now.

Instructors: Jessica Hays, David Bean, & Brad Curtis

Jessica Hays is a technical instructor at FireEye Mandiant. With 13 years of experience in the cybersecurity field, she has worked in a variety of capacities, including incident response and handling, but is currently specializing in cybersecurity awareness through proactive measures and threat intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government intelligence agencies.

David Bean is a senior consultant at Mandiant, a FireEye company. With more than 20 years of experience in information security and related technology, he has worked with internet service providers, higher education institutions, as well as working in the healthcare industry. His varying positions have included network engineer and architect, system administrator, security analyst and security awareness trainer among others. Bean holds a Bachelor of Science Degree in mechanical engineering from the University of Tennessee, Knoxville, and enjoys presenting on security-related topics at local industry events.

Brad Curtis is a principal consultant and cybersecurity subject matter expert with more than 15 years of information security experience. He joined Mandiant in July 2017, where he provides expertise to clients in the design, implementation and continuous improvement of information security programs. Before joining Mandiant, Curtis led information security programs in the healthcare and health insurance industries for over 12 years. He has a technical background in networking and operating system administration, both on Windows and Linux/UNIX platforms. He has a thorough understanding of malware, computer forensics, and tactics, techniques and procedures leveraged by attackers.


Cybersecurity Courses Powered by EmergingEd: Windows Enterprise Incident Response

What does crime scene investigation look like if the scene is virtual? This Mandiant course teaches the fundamental investigative techniques you need to respond to cyber threats. You'll learn to conduct rapid triage on a system to determine whether it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms and investigate an incident throughout an enterprise. Discover how attackers move around in a compromised Windows environment and explore information management that enriches the investigative process and bolsters an enterprise security program.

Course dates: Ongoing enrollment
Course duration: Self-paced
Fee: $3,000
Register now.

Instructors: Joseph Perry & Ashley Frazer
Joseph Perry is a senior technical instructor at FireEye Mandiant with more than a decade's worth of experience working in cybersecurity. He began his career as a Cryptographic Technician in the U.S. Navy, where he was the youngest Sailor ever offered a position at the Navy's elite Cyber Warfare Development Group. During his time there, he learned programming in four languages, worked on the development of the Navy's most sophisticated Cyberwarfare assets and became the first Enlisted Sailor in history to be accepted the National Security Agency's CNODP/GDP. After graduating from the program, Perry went on to work in the research and development arm of the National Security Agency.

After leaving the federal government, he began his career in cybersecurity education for the private sector, providing education to more than half a million people worldwide.

Today, Perry works as the senior technical instructor for Mandiant and provides technical, professional and awareness training and consultation to organizations ranging from gaming clubs and Fortune 50 companies to national and international agencies. 

Ashley Frazer holds a degree in electrical engineering and started her professional career designing electrical production wiring diagrams for military aircraft. After four years as an electrical engineer, Frazer joined the FBI as a Special Agent. Following graduation from the FBI Academy, she served on the St. Louis Division's Cyber Squad and was a member of the Evidence Response and Crisis Negotiation Teams. She transferred to the FBI's Honolulu Division after five years in St. Louis and continued to investigate Cyber Crimes with a focus on national security and financially-motivated computer intrusions. In this role, she was responsible for the management of investigations, interviews of victims, subjects, sources, digital evidence collection, and host and network-based forensic analysis.

Frazer is currently a senior incident response consultant in Mandiant's Denver office. As part of the Incident Response Team, Ashley leads Incident Response, Compromise Assessment, and Computer forensic engagements. She also serves as an instructor for Mandiant's Windows and Linux Enterprise Incident Response courses.


Cybersecurity Courses Powered by EmergingEd: Cybersecurity Foundations and Frameworks

In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks teaches you to assess where your organization sits amid the cyber threat landscape and to identify risks, threats and vulnerabilities associated with your industry. Through practical learning scenarios rooted in real-world examples, this cybersecurity course teaches you to prioritize the most effective elements of security frameworks for your organization and to manage cybersecurity frameworks within the context of industry compliance regulations.
Course dates: Ongoing enrollment
Course duration: 8 weeks
Fee: $1,500
Register now.

Instructor: Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.

Cybersecurity Courses Powered by EmergingEd: Cybersecurity Risks and Industry

You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? Cybersecurity Risks and Industry teaches you to address gaps within your company in terms of the people, processes and technologies responsible for preventing, mitigating and responding to cyberattacks. Through practical learning scenarios that address common cybersecurity incidents and concerns, you will learn to develop an incident response plan for your organization; deputize non-security staff to participate; align processes, policies and tools to upgrade your company’s security capabilities; and prioritize strategic education initiatives for your team.
Course dates: Ongoing enrollment
Course duration: 8 weeks
Fee: $1,500
Register now.

Instructor: Jeffrey Groman, CISSP
See bio above.

Cybersecurity Courses Powered by EmergingEd: Cybersecurity Cases

What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. Through deep engagement with real-world case studies, you will learn to create a strategic assessment strategy to optimize your capabilities and prioritize your spend; analyze the validity, value and reliability of threat intelligence; proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.
Course dates: Ongoing enrollment
Course duration: 8 weeks
Fee: $1,500
Register now.

Instructor: Jeffrey Groman, CISSP

See bio above.

Cybersecurity Courses Powered by EmergingEd: Cloud Security

Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud Security prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloud-based services, and you will build the knowledge to identify appropriate on-premise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.
Course dates: Ongoing enrollment
Course duration: 4 weeks
Fee: $500
Register now.

Instructor: Jeffrey Groman, CISSP
See bio above.

Cybersecurity Courses Powered by EmergingEd: Cyber Threat Intelligence

Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? Cyber Threat Intelligence trains professionals to understand and act upon the cybersecurity-related information available to them. You will learn to identify open-source, third-party and internal sources of threat intelligence; evaluate the worth and applicability of intelligence within your organization and industry; summarize gathered intelligence in a manner that is clear and intelligible to all audiences, and operationalize intelligence within your security team.
Course dates: Ongoing enrollment
Course duration: 4 weeks
Fee: $500
Register now.

Instructor: Jeffrey Groman, CISSP
See bio above.

Cybersecurity Courses Powered by EmergingEd: Building a Threat Hunting Capability

Turn your defense into offense with Building a Threat Hunting Capability, a course designed to explore the options available to organizations for cyber threat hunting, including manual, automated and machine-assisted hunters. You will learn to identify and evaluate strategies for cyber-attack prevention and improve your preparedness for cyber threats. Lead the transformation of your company’s team structures and learn new advanced security processes from a certified expert.
Course dates: Ongoing enrollment
Course duration: 4 weeks
Fee: $500
Register now.

Instructor: Jeffrey Groman, CISSP
See bio above.

Cybersecurity Courses Powered by EmergingEd: Building a Red Team Capability

Can a friendly company hacker exist? A growing number of companies see the advantage not only in simulated attacks but in indirectly testing their defense controls and their ability to detect attacks as well. Increase your value within your organization’s security team by finding the gaps in your organization’s cyber defenses and addressing them before nefarious parties attempt to break in. In Building a Red Team Capability, you’ll discover strategies to test your organization’s ability to detect cyberattacks and understand how to test an organization’s defense controls.
Course dates: Ongoing enrollment
Course duration: 4 weeks
Fee: $500
Register now.

Instructor: Jeffrey Groman, CISSP

See bio above.


The flagship campus of the University of Tennessee System and partner in the Tennessee Transfer Pathway.